RLSA-2024:4002

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:4002.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:4002
Related
Published
2024-07-02T14:11:35.145045Z
Modified
2024-07-02T14:13:10.839594Z
Summary
Important: thunderbird security update
Details

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 115.12.1.

Security Fix(es):

  • thunderbird: Use-after-free in networking (CVE-2024-5702)

  • thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688)

  • thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690)

  • thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)

  • thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)

  • thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696)

  • thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/rocky-linux/thunderbird?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:115.12.1-1.el9_4